SlideShare a Scribd company logo
1 of 1
Download to read offline
Backup
DATA HEALTH CHECK 2013 RESULTS
Backup is getting easier, but does that mean we back up too much?

45%

1/3

of respondents are using
combined media and online-based services.

of respondents
either have no data
retention policy at
all or simply keep all
data forever.

Tape is on its way out, as use fell to just 6%.

We asked our respondents how confident
they were in the effectiveness of their
backup solution:
35%
40%

55%
54%

8%
6%

Survey years:
2008
2013

51%

Very confident

Fairly confident

Not confident

of respondents find end
point devices (laptops, smartphones and
tablets) the most challenging to backup.

Download the full Data Health Check 2013 Report
from www.databarracks.com

As we modernise the
physical media we use,
access to our backed up
data gets easier and
more responsive

However, this
convenience shouldn’t
result in unchecked
storage growth

Establish clear and
intelligent retention
policies to make backup
most effective

More Related Content

What's hot

Allegient and IUPUI Develop Big Data Search Tool (SURAAK)
Allegient and IUPUI Develop Big Data Search Tool (SURAAK)Allegient and IUPUI Develop Big Data Search Tool (SURAAK)
Allegient and IUPUI Develop Big Data Search Tool (SURAAK)sligh
 
Innovation in Clinical Trials
Innovation in Clinical Trials Innovation in Clinical Trials
Innovation in Clinical Trials Gary Monk
 
Software Advice IndustryView: Use of Speech Therapy Software for Home Practice
Software Advice IndustryView: Use of Speech Therapy Software for Home PracticeSoftware Advice IndustryView: Use of Speech Therapy Software for Home Practice
Software Advice IndustryView: Use of Speech Therapy Software for Home PracticeSoftware Advice
 
What is Patient Engagement?
What is Patient Engagement?What is Patient Engagement?
What is Patient Engagement?HT Works
 
Personalized Mobile Applications in HealthCare by Bhargavi Upadhya
Personalized Mobile Applications in HealthCare by Bhargavi UpadhyaPersonalized Mobile Applications in HealthCare by Bhargavi Upadhya
Personalized Mobile Applications in HealthCare by Bhargavi UpadhyaApollo Hospitals Group and ATNF
 
The 2017 Hospital Guide to Secure Mobile Messaging Success
The 2017 Hospital Guide to Secure Mobile Messaging SuccessThe 2017 Hospital Guide to Secure Mobile Messaging Success
The 2017 Hospital Guide to Secure Mobile Messaging SuccessSpok
 
Keeping Community Hospitals Thriving and Independent
Keeping Community Hospitals Thriving and IndependentKeeping Community Hospitals Thriving and Independent
Keeping Community Hospitals Thriving and Independentathenahealth
 
Convert with Confidence: Barriers and Benefits of the EHR Switch
Convert with Confidence: Barriers and Benefits of the EHR SwitchConvert with Confidence: Barriers and Benefits of the EHR Switch
Convert with Confidence: Barriers and Benefits of the EHR Switchathenahealth
 
Sleep Tech: An Ecosystem of Electric Sleep - Daniel Ruppar, Frost & Sullivan ...
Sleep Tech: An Ecosystem of Electric Sleep - Daniel Ruppar, Frost & Sullivan ...Sleep Tech: An Ecosystem of Electric Sleep - Daniel Ruppar, Frost & Sullivan ...
Sleep Tech: An Ecosystem of Electric Sleep - Daniel Ruppar, Frost & Sullivan ...Jill Gilbert
 
The State of Mobile Communications in Healthcare: Survey Results Part 2
The State of Mobile Communications in Healthcare: Survey Results Part 2The State of Mobile Communications in Healthcare: Survey Results Part 2
The State of Mobile Communications in Healthcare: Survey Results Part 2Spok
 
2015 Identity Summit - Philips Case Study: New Healthcare Solutions and Pati...
2015 Identity Summit - Philips Case Study:  New Healthcare Solutions and Pati...2015 Identity Summit - Philips Case Study:  New Healthcare Solutions and Pati...
2015 Identity Summit - Philips Case Study: New Healthcare Solutions and Pati...ForgeRock
 
Applying the principles to community engagement projects
Applying the principles to community engagement projectsApplying the principles to community engagement projects
Applying the principles to community engagement projectsMotivating Change Group
 
Uk best sme_mobile_health_app_-_total_mobile
Uk best sme_mobile_health_app_-_total_mobileUk best sme_mobile_health_app_-_total_mobile
Uk best sme_mobile_health_app_-_total_mobile3GDR
 
HxRefactored 2015: MediSafe "Cloud-Synced Medication Management for Patients ...
HxRefactored 2015: MediSafe "Cloud-Synced Medication Management for Patients ...HxRefactored 2015: MediSafe "Cloud-Synced Medication Management for Patients ...
HxRefactored 2015: MediSafe "Cloud-Synced Medication Management for Patients ...HxRefactored
 
Going Mobile: Using mobile to enhance care and efficiency
 Going Mobile: Using mobile to enhance care and efficiency Going Mobile: Using mobile to enhance care and efficiency
Going Mobile: Using mobile to enhance care and efficiencyathenahealth
 
Future of wearbles 2016
Future of wearbles 2016Future of wearbles 2016
Future of wearbles 2016Akin Akinfenwa
 
Digital Health & Wellness Summit @ Mobile World Congress 2016
Digital Health & Wellness Summit @ Mobile World Congress 2016Digital Health & Wellness Summit @ Mobile World Congress 2016
Digital Health & Wellness Summit @ Mobile World Congress 20163GDR
 
Putting the Power in the Patient's Hands: Digital Health Trends
Putting the Power in the Patient's Hands: Digital Health TrendsPutting the Power in the Patient's Hands: Digital Health Trends
Putting the Power in the Patient's Hands: Digital Health TrendsSouthWiRED
 
State of Wearables Today - 2018 Consumer Survey
State of Wearables Today - 2018 Consumer SurveyState of Wearables Today - 2018 Consumer Survey
State of Wearables Today - 2018 Consumer SurveyValencell, Inc
 
Top Wearables Predictions for the Year Ahead and 2018: Year in Review
Top Wearables Predictions for the Year Ahead and 2018: Year in ReviewTop Wearables Predictions for the Year Ahead and 2018: Year in Review
Top Wearables Predictions for the Year Ahead and 2018: Year in ReviewValencell, Inc
 

What's hot (20)

Allegient and IUPUI Develop Big Data Search Tool (SURAAK)
Allegient and IUPUI Develop Big Data Search Tool (SURAAK)Allegient and IUPUI Develop Big Data Search Tool (SURAAK)
Allegient and IUPUI Develop Big Data Search Tool (SURAAK)
 
Innovation in Clinical Trials
Innovation in Clinical Trials Innovation in Clinical Trials
Innovation in Clinical Trials
 
Software Advice IndustryView: Use of Speech Therapy Software for Home Practice
Software Advice IndustryView: Use of Speech Therapy Software for Home PracticeSoftware Advice IndustryView: Use of Speech Therapy Software for Home Practice
Software Advice IndustryView: Use of Speech Therapy Software for Home Practice
 
What is Patient Engagement?
What is Patient Engagement?What is Patient Engagement?
What is Patient Engagement?
 
Personalized Mobile Applications in HealthCare by Bhargavi Upadhya
Personalized Mobile Applications in HealthCare by Bhargavi UpadhyaPersonalized Mobile Applications in HealthCare by Bhargavi Upadhya
Personalized Mobile Applications in HealthCare by Bhargavi Upadhya
 
The 2017 Hospital Guide to Secure Mobile Messaging Success
The 2017 Hospital Guide to Secure Mobile Messaging SuccessThe 2017 Hospital Guide to Secure Mobile Messaging Success
The 2017 Hospital Guide to Secure Mobile Messaging Success
 
Keeping Community Hospitals Thriving and Independent
Keeping Community Hospitals Thriving and IndependentKeeping Community Hospitals Thriving and Independent
Keeping Community Hospitals Thriving and Independent
 
Convert with Confidence: Barriers and Benefits of the EHR Switch
Convert with Confidence: Barriers and Benefits of the EHR SwitchConvert with Confidence: Barriers and Benefits of the EHR Switch
Convert with Confidence: Barriers and Benefits of the EHR Switch
 
Sleep Tech: An Ecosystem of Electric Sleep - Daniel Ruppar, Frost & Sullivan ...
Sleep Tech: An Ecosystem of Electric Sleep - Daniel Ruppar, Frost & Sullivan ...Sleep Tech: An Ecosystem of Electric Sleep - Daniel Ruppar, Frost & Sullivan ...
Sleep Tech: An Ecosystem of Electric Sleep - Daniel Ruppar, Frost & Sullivan ...
 
The State of Mobile Communications in Healthcare: Survey Results Part 2
The State of Mobile Communications in Healthcare: Survey Results Part 2The State of Mobile Communications in Healthcare: Survey Results Part 2
The State of Mobile Communications in Healthcare: Survey Results Part 2
 
2015 Identity Summit - Philips Case Study: New Healthcare Solutions and Pati...
2015 Identity Summit - Philips Case Study:  New Healthcare Solutions and Pati...2015 Identity Summit - Philips Case Study:  New Healthcare Solutions and Pati...
2015 Identity Summit - Philips Case Study: New Healthcare Solutions and Pati...
 
Applying the principles to community engagement projects
Applying the principles to community engagement projectsApplying the principles to community engagement projects
Applying the principles to community engagement projects
 
Uk best sme_mobile_health_app_-_total_mobile
Uk best sme_mobile_health_app_-_total_mobileUk best sme_mobile_health_app_-_total_mobile
Uk best sme_mobile_health_app_-_total_mobile
 
HxRefactored 2015: MediSafe "Cloud-Synced Medication Management for Patients ...
HxRefactored 2015: MediSafe "Cloud-Synced Medication Management for Patients ...HxRefactored 2015: MediSafe "Cloud-Synced Medication Management for Patients ...
HxRefactored 2015: MediSafe "Cloud-Synced Medication Management for Patients ...
 
Going Mobile: Using mobile to enhance care and efficiency
 Going Mobile: Using mobile to enhance care and efficiency Going Mobile: Using mobile to enhance care and efficiency
Going Mobile: Using mobile to enhance care and efficiency
 
Future of wearbles 2016
Future of wearbles 2016Future of wearbles 2016
Future of wearbles 2016
 
Digital Health & Wellness Summit @ Mobile World Congress 2016
Digital Health & Wellness Summit @ Mobile World Congress 2016Digital Health & Wellness Summit @ Mobile World Congress 2016
Digital Health & Wellness Summit @ Mobile World Congress 2016
 
Putting the Power in the Patient's Hands: Digital Health Trends
Putting the Power in the Patient's Hands: Digital Health TrendsPutting the Power in the Patient's Hands: Digital Health Trends
Putting the Power in the Patient's Hands: Digital Health Trends
 
State of Wearables Today - 2018 Consumer Survey
State of Wearables Today - 2018 Consumer SurveyState of Wearables Today - 2018 Consumer Survey
State of Wearables Today - 2018 Consumer Survey
 
Top Wearables Predictions for the Year Ahead and 2018: Year in Review
Top Wearables Predictions for the Year Ahead and 2018: Year in ReviewTop Wearables Predictions for the Year Ahead and 2018: Year in Review
Top Wearables Predictions for the Year Ahead and 2018: Year in Review
 

Similar to Infographic: Are we backing up too much?

System i User Survey Infographic
System i User Survey InfographicSystem i User Survey Infographic
System i User Survey InfographicInforsystemi
 
Encrypting User Data in the NHS 2016
Encrypting User Data in the NHS 2016Encrypting User Data in the NHS 2016
Encrypting User Data in the NHS 2016Ben B
 
A Guide to Thoughtful Governance - Liberty and Justice for All
A Guide to Thoughtful Governance - Liberty and Justice for AllA Guide to Thoughtful Governance - Liberty and Justice for All
A Guide to Thoughtful Governance - Liberty and Justice for AllNirav Shah
 
Crossing the Threshold: Clinical Portals from a Site Perspective
Crossing the Threshold: Clinical Portals from a Site Perspective Crossing the Threshold: Clinical Portals from a Site Perspective
Crossing the Threshold: Clinical Portals from a Site Perspective Intralinks
 
Responsible Data for Children Training_PublicSlides_110922.pdf
Responsible Data for Children Training_PublicSlides_110922.pdfResponsible Data for Children Training_PublicSlides_110922.pdf
Responsible Data for Children Training_PublicSlides_110922.pdfStefaan Verhulst
 
Mobile Sentiment Presentation Ver 3.0
Mobile Sentiment Presentation Ver 3.0Mobile Sentiment Presentation Ver 3.0
Mobile Sentiment Presentation Ver 3.0Darrin Helsel
 
Norton Mobile Apps Survey Report
Norton Mobile Apps Survey ReportNorton Mobile Apps Survey Report
Norton Mobile Apps Survey ReportSymantec
 
How Good Privacy Practices can help prepare for a Data Breach from TRUSTe
How Good Privacy Practices can help prepare for a Data Breach from TRUSTe How Good Privacy Practices can help prepare for a Data Breach from TRUSTe
How Good Privacy Practices can help prepare for a Data Breach from TRUSTe TrustArc
 
Digital is the New Traditional - Senior Living
Digital is the New Traditional - Senior LivingDigital is the New Traditional - Senior Living
Digital is the New Traditional - Senior LivingBluespire Marketing
 
5 Myths About Mobile Communication Success
5 Myths About Mobile Communication Success5 Myths About Mobile Communication Success
5 Myths About Mobile Communication SuccessSpok
 
The State of Privacy Report
The State of Privacy ReportThe State of Privacy Report
The State of Privacy ReportFigLeaf
 
Conducting High Impact Research: Building data ownership and improving data use
Conducting High Impact Research: Building data ownership and improving data useConducting High Impact Research: Building data ownership and improving data use
Conducting High Impact Research: Building data ownership and improving data useMEASURE Evaluation
 
How to Build a Privacy Program
How to Build a Privacy ProgramHow to Build a Privacy Program
How to Build a Privacy Programsecratic
 
2016 Connected Patient Report - Sponsor Content From: Salesforce
2016 Connected Patient Report - Sponsor Content From: Salesforce    2016 Connected Patient Report - Sponsor Content From: Salesforce
2016 Connected Patient Report - Sponsor Content From: Salesforce Alessandro Mazzarisi
 
Our kids and the digital utilities
Our kids and the digital utilitiesOur kids and the digital utilities
Our kids and the digital utilitiesFiras Dabbagh
 
CHC 2020 Telehealth Research Study
CHC 2020 Telehealth Research StudyCHC 2020 Telehealth Research Study
CHC 2020 Telehealth Research StudyCHC Connecticut
 
Stop, Collaborate and Listen: The Social Lives of Healthcare Professionals
Stop, Collaborate and Listen: The Social Lives of Healthcare ProfessionalsStop, Collaborate and Listen: The Social Lives of Healthcare Professionals
Stop, Collaborate and Listen: The Social Lives of Healthcare ProfessionalsShwen Gwee
 
Mdg marketing-asset-2-full draft-v2
Mdg marketing-asset-2-full draft-v2Mdg marketing-asset-2-full draft-v2
Mdg marketing-asset-2-full draft-v2danishnizami
 
Mdg marketing-asset-2-full draft-v2
Mdg marketing-asset-2-full draft-v2Mdg marketing-asset-2-full draft-v2
Mdg marketing-asset-2-full draft-v2danishnizami
 

Similar to Infographic: Are we backing up too much? (20)

System i User Survey Infographic
System i User Survey InfographicSystem i User Survey Infographic
System i User Survey Infographic
 
Encrypting User Data in the NHS 2016
Encrypting User Data in the NHS 2016Encrypting User Data in the NHS 2016
Encrypting User Data in the NHS 2016
 
A Guide to Thoughtful Governance - Liberty and Justice for All
A Guide to Thoughtful Governance - Liberty and Justice for AllA Guide to Thoughtful Governance - Liberty and Justice for All
A Guide to Thoughtful Governance - Liberty and Justice for All
 
Crossing the Threshold: Clinical Portals from a Site Perspective
Crossing the Threshold: Clinical Portals from a Site Perspective Crossing the Threshold: Clinical Portals from a Site Perspective
Crossing the Threshold: Clinical Portals from a Site Perspective
 
Responsible Data for Children Training_PublicSlides_110922.pdf
Responsible Data for Children Training_PublicSlides_110922.pdfResponsible Data for Children Training_PublicSlides_110922.pdf
Responsible Data for Children Training_PublicSlides_110922.pdf
 
Mobile Sentiment Presentation Ver 3.0
Mobile Sentiment Presentation Ver 3.0Mobile Sentiment Presentation Ver 3.0
Mobile Sentiment Presentation Ver 3.0
 
Norton Mobile Apps Survey Report
Norton Mobile Apps Survey ReportNorton Mobile Apps Survey Report
Norton Mobile Apps Survey Report
 
How Good Privacy Practices can help prepare for a Data Breach from TRUSTe
How Good Privacy Practices can help prepare for a Data Breach from TRUSTe How Good Privacy Practices can help prepare for a Data Breach from TRUSTe
How Good Privacy Practices can help prepare for a Data Breach from TRUSTe
 
Digital is the New Traditional - Senior Living
Digital is the New Traditional - Senior LivingDigital is the New Traditional - Senior Living
Digital is the New Traditional - Senior Living
 
5 Myths About Mobile Communication Success
5 Myths About Mobile Communication Success5 Myths About Mobile Communication Success
5 Myths About Mobile Communication Success
 
The Digital health generation #digital healthgen
The Digital health generation #digital healthgenThe Digital health generation #digital healthgen
The Digital health generation #digital healthgen
 
The State of Privacy Report
The State of Privacy ReportThe State of Privacy Report
The State of Privacy Report
 
Conducting High Impact Research: Building data ownership and improving data use
Conducting High Impact Research: Building data ownership and improving data useConducting High Impact Research: Building data ownership and improving data use
Conducting High Impact Research: Building data ownership and improving data use
 
How to Build a Privacy Program
How to Build a Privacy ProgramHow to Build a Privacy Program
How to Build a Privacy Program
 
2016 Connected Patient Report - Sponsor Content From: Salesforce
2016 Connected Patient Report - Sponsor Content From: Salesforce    2016 Connected Patient Report - Sponsor Content From: Salesforce
2016 Connected Patient Report - Sponsor Content From: Salesforce
 
Our kids and the digital utilities
Our kids and the digital utilitiesOur kids and the digital utilities
Our kids and the digital utilities
 
CHC 2020 Telehealth Research Study
CHC 2020 Telehealth Research StudyCHC 2020 Telehealth Research Study
CHC 2020 Telehealth Research Study
 
Stop, Collaborate and Listen: The Social Lives of Healthcare Professionals
Stop, Collaborate and Listen: The Social Lives of Healthcare ProfessionalsStop, Collaborate and Listen: The Social Lives of Healthcare Professionals
Stop, Collaborate and Listen: The Social Lives of Healthcare Professionals
 
Mdg marketing-asset-2-full draft-v2
Mdg marketing-asset-2-full draft-v2Mdg marketing-asset-2-full draft-v2
Mdg marketing-asset-2-full draft-v2
 
Mdg marketing-asset-2-full draft-v2
Mdg marketing-asset-2-full draft-v2Mdg marketing-asset-2-full draft-v2
Mdg marketing-asset-2-full draft-v2
 

More from Databarracks

How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
How to write an effective Cyber Incident Response Plan
How to write an effective Cyber Incident Response PlanHow to write an effective Cyber Incident Response Plan
How to write an effective Cyber Incident Response PlanDatabarracks
 
Lessons from 100+ ransomware recoveries
Lessons from 100+ ransomware recoveriesLessons from 100+ ransomware recoveries
Lessons from 100+ ransomware recoveriesDatabarracks
 
How to write an IT Disaster Recovery Plan
How to write an IT Disaster Recovery PlanHow to write an IT Disaster Recovery Plan
How to write an IT Disaster Recovery PlanDatabarracks
 
Cyber Incident Response Plan
Cyber Incident Response PlanCyber Incident Response Plan
Cyber Incident Response PlanDatabarracks
 
Who's responsible for what in a crisis
Who's responsible for what in a crisisWho's responsible for what in a crisis
Who's responsible for what in a crisisDatabarracks
 
How to communicate in a crisis
How to communicate in a crisisHow to communicate in a crisis
How to communicate in a crisisDatabarracks
 
How to protect backups from ransomware
How to protect backups from ransomwareHow to protect backups from ransomware
How to protect backups from ransomwareDatabarracks
 
Requirements for cyber insurance
Requirements for cyber insuranceRequirements for cyber insurance
Requirements for cyber insuranceDatabarracks
 
How to make your supply chain resilient
How to make your supply chain resilientHow to make your supply chain resilient
How to make your supply chain resilientDatabarracks
 
How to recover from ransomware lessons from real recoveries
How to recover from ransomware   lessons from real recoveriesHow to recover from ransomware   lessons from real recoveries
How to recover from ransomware lessons from real recoveriesDatabarracks
 
How to decommission a data centre
How to decommission a data centreHow to decommission a data centre
How to decommission a data centreDatabarracks
 
Zerto in azure technical deep dive
Zerto in azure   technical deep diveZerto in azure   technical deep dive
Zerto in azure technical deep diveDatabarracks
 
How to know when combined backup and replication is for you
How to know when combined backup and replication is for youHow to know when combined backup and replication is for you
How to know when combined backup and replication is for youDatabarracks
 
How to write an effective Cyber Incident Response Plan
How to write an effective Cyber Incident Response PlanHow to write an effective Cyber Incident Response Plan
How to write an effective Cyber Incident Response PlanDatabarracks
 
Introducing rubrik a new approach to data protection
Introducing rubrik   a new approach to data protectionIntroducing rubrik   a new approach to data protection
Introducing rubrik a new approach to data protectionDatabarracks
 
How to invoke Disaster Recovery
How to invoke Disaster RecoveryHow to invoke Disaster Recovery
How to invoke Disaster RecoveryDatabarracks
 
How to setup disaster recovery
How to setup disaster recoveryHow to setup disaster recovery
How to setup disaster recoveryDatabarracks
 
DRaaS to Azure with Zerto
DRaaS to Azure with ZertoDRaaS to Azure with Zerto
DRaaS to Azure with ZertoDatabarracks
 
The Databarracks Continuity Toolshed: Free tools for better recoveries
The Databarracks Continuity Toolshed: Free tools for better recoveriesThe Databarracks Continuity Toolshed: Free tools for better recoveries
The Databarracks Continuity Toolshed: Free tools for better recoveriesDatabarracks
 

More from Databarracks (20)

How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
How to write an effective Cyber Incident Response Plan
How to write an effective Cyber Incident Response PlanHow to write an effective Cyber Incident Response Plan
How to write an effective Cyber Incident Response Plan
 
Lessons from 100+ ransomware recoveries
Lessons from 100+ ransomware recoveriesLessons from 100+ ransomware recoveries
Lessons from 100+ ransomware recoveries
 
How to write an IT Disaster Recovery Plan
How to write an IT Disaster Recovery PlanHow to write an IT Disaster Recovery Plan
How to write an IT Disaster Recovery Plan
 
Cyber Incident Response Plan
Cyber Incident Response PlanCyber Incident Response Plan
Cyber Incident Response Plan
 
Who's responsible for what in a crisis
Who's responsible for what in a crisisWho's responsible for what in a crisis
Who's responsible for what in a crisis
 
How to communicate in a crisis
How to communicate in a crisisHow to communicate in a crisis
How to communicate in a crisis
 
How to protect backups from ransomware
How to protect backups from ransomwareHow to protect backups from ransomware
How to protect backups from ransomware
 
Requirements for cyber insurance
Requirements for cyber insuranceRequirements for cyber insurance
Requirements for cyber insurance
 
How to make your supply chain resilient
How to make your supply chain resilientHow to make your supply chain resilient
How to make your supply chain resilient
 
How to recover from ransomware lessons from real recoveries
How to recover from ransomware   lessons from real recoveriesHow to recover from ransomware   lessons from real recoveries
How to recover from ransomware lessons from real recoveries
 
How to decommission a data centre
How to decommission a data centreHow to decommission a data centre
How to decommission a data centre
 
Zerto in azure technical deep dive
Zerto in azure   technical deep diveZerto in azure   technical deep dive
Zerto in azure technical deep dive
 
How to know when combined backup and replication is for you
How to know when combined backup and replication is for youHow to know when combined backup and replication is for you
How to know when combined backup and replication is for you
 
How to write an effective Cyber Incident Response Plan
How to write an effective Cyber Incident Response PlanHow to write an effective Cyber Incident Response Plan
How to write an effective Cyber Incident Response Plan
 
Introducing rubrik a new approach to data protection
Introducing rubrik   a new approach to data protectionIntroducing rubrik   a new approach to data protection
Introducing rubrik a new approach to data protection
 
How to invoke Disaster Recovery
How to invoke Disaster RecoveryHow to invoke Disaster Recovery
How to invoke Disaster Recovery
 
How to setup disaster recovery
How to setup disaster recoveryHow to setup disaster recovery
How to setup disaster recovery
 
DRaaS to Azure with Zerto
DRaaS to Azure with ZertoDRaaS to Azure with Zerto
DRaaS to Azure with Zerto
 
The Databarracks Continuity Toolshed: Free tools for better recoveries
The Databarracks Continuity Toolshed: Free tools for better recoveriesThe Databarracks Continuity Toolshed: Free tools for better recoveries
The Databarracks Continuity Toolshed: Free tools for better recoveries
 

Recently uploaded

Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 

Recently uploaded (20)

Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 

Infographic: Are we backing up too much?

  • 1. Backup DATA HEALTH CHECK 2013 RESULTS Backup is getting easier, but does that mean we back up too much? 45% 1/3 of respondents are using combined media and online-based services. of respondents either have no data retention policy at all or simply keep all data forever. Tape is on its way out, as use fell to just 6%. We asked our respondents how confident they were in the effectiveness of their backup solution: 35% 40% 55% 54% 8% 6% Survey years: 2008 2013 51% Very confident Fairly confident Not confident of respondents find end point devices (laptops, smartphones and tablets) the most challenging to backup. Download the full Data Health Check 2013 Report from www.databarracks.com As we modernise the physical media we use, access to our backed up data gets easier and more responsive However, this convenience shouldn’t result in unchecked storage growth Establish clear and intelligent retention policies to make backup most effective